SlideShare a Scribd company logo
OneM2M
Standard Specification
Khamdamboy Urunov, a Ph.D. student.
Special Communication Research Center.,
Financial Information Security.,
Kookmin University
Seoul, South Korea
Requirements
(TS-0002-V2.7.1)
The schedule of OneM2M Specification
• TS-0002-V2.7.1 Requirements
• TS-0001- Functional_Architecture-V2_10_0
• TS-0004_Service_Layer_Core_Protocol_V2_7_1
2
Contents
• Functional Requirements
• Semantics Requirements
• Security Requirements
• Charging Requirements
• Operational Requirements
• Communication Management Requirements
• LWM2M Interworking Requirements
3
Requirements
(TS-0002-V2.7.1)
Functional roles description
4
Individual or
Company- end user
- Provides an M2M Application
Service
- Operates M2M Application
- Provides an M2M Services to
Application Service Provider
- Operates M2M Common
Service
• Provides Connectivity and related services for M2M
Service Providers
• Operates an Underlying Network. Such an Underlying
Network could be a telecom network.
5
Requirement ID Description Release
OSR-001 The oneM2M System shall allow communication between M2M
Applications by using multiple communication means based on IP
access.
Implemented in Rel-
1
OSR-002a The oneM2M System shall support communication means that can
accommodate devices with constrained computing (e.g. small CPU,
memory, battery) or communication capabilities (e.g. 2G wireless
modem, certain WLAN node).
Implemented in Rel-
1
OSR-002b The oneM2M System shall support communication means that can
accommodate devices with rich computing capabilities (e.g. large CPU,
memory) or communication (e.g. 3/4G wireless modem, wireline).
Implemented in Rel-
1
OSR-006 The oneM2M System shall be able to reuse the services offered by Underlying
Networks to M2M Applications and/or M2M Services by means of open access
models (e.g. OMA, GSMA OneAPI framework).
Examples of available services are:
• IP Multimedia communications.
• Messaging.
• Location.
• Charging and billing services.
• Device information and profiles.
• Configuration and management of devices.
• Triggering, monitoring of devices.
• Small data transmission.
• Group management. (see note 1).
Partially
implemented (see
note 10
Table 1: Overall System Requirements
Functional Requirements~100 requirements
Note1: The set of features or APIs to be supported depends on the M2M Common Services and access to available APIs
6
Requirement ID Description Release
OSR-012 The oneM2M System shall support communications
between M2M Applications and M2M Devices supporting
M2M Services by means of continuous or non continuous
connectivity.
Implemented in
Rel-1
OSR-014 The oneM2M System shall be able to communicate with
M2M Devices, behind an M2M Gateway that supports
heterogeneous M2M Area Networks.
Implemented in
Rel-1
OSR-020 The oneM2M System shall be able to support policies and
their management regarding the aspects of storage and
retrieval of data/information.
Implemented in
Rel-1
OSR-021 The oneM2M System shall be able to provide mechanisms
to enable sharing of data among multiple M2M
Applications.
Implemented in
Rel-1
OSR-046 The oneM2M System shall be able to support a capability
for the M2M Application to request/disallow
acknowledgement for its communication.
Not
implemented
Table 1: Overall System Requirement
Functional Requirements (1)
7
Requirement ID Description Release
OSR-061 M2M Devices and M2M Gateways may support time
synchronization within the oneM2M System.
Not implemented
OSR-75 See
REQ-
20150546R01
The oneM2M System shall be able to collect, store Time
Series Data.
Implemented in
Rel-2
OSR-76 See
REQ-
20150546R01
The oneM2M System shall be able to detect and report the
missing data in time series.
Implemented in
Rel-2
OSR-086 See
REQ-
20150611R02
The oneM2M System shall enable M2M Gateways to
discover M2M Infrastructure Nodes and M2M Devices
available for data exchange.
Not implemented
OSR-090 See
REQ-
20150622R02
The oneM2M System shall be able to forward the M2M
Application Data to M2M Application without storing the Data.
Partially
implemented (see
note 22)
OSR-098 See
REQ-
20160055R02
The oneM2M system shall be able to support machine
socialization functionalities (such as existence discovery,
correlated task discovery, message interface discovery
and process optimization for multiple machines with same
tasks).
Not implemented
Table 1: Overall System Requirem
Functional Requirements (2)
NOTE 22: In Rel-2 data are stored in the CSE but never get retrieved by other entities except by subscribe/notify
mechanism.
Management Requirements
8
Table 2: Management Requirements
~19 requirements
Requirement
ID
Description Release
MGR-001 The oneM2M System shall be able to support management and configuration
of M2M Gateways/ Devices including resource constrained M2M Devices.
Implemented in
Rel-1
MGR-002 The oneM2M System shall provide the capability to discover the M2M Area
Networks including information about devices on those networks and the
parameters (e.g. topology, protocol) of those networks.
Implemented in
Rel-1
MGR-008 The oneM2M System shall provide the capability for software management of
devices in M2M Area Networks.
Implemented in
Rel-1
MGR-009 The oneM2M System shall provide the capability for rebooting and/or
resetting of M2M Gateways/Devices and other devices in M2M Area
Networks.
Implemented in
Rel-1
MGR-010 The oneM2M System shall provide the capability for authorizing devices to
access M2M Area Networks.
Implemented in
Rel-1
MGR-016 The oneM2M System shall be able to retrieve information related to the Static
and Dynamic Device/Gateway Context for M2M Gateways/Devices as well as
Device Context for other devices in M2M Area Networks.
Implemented in
Rel-1
Semantics Requirements
9
Ontology Related Requirements
Table 3: Ontology Requirements
Requirement ID Description Release
ONT-001 See REQ-
20150521R01
The M2M System shall support a standardized format for the
rules/policies used to define service logic.
Not
implemented
ONT-002 See REQ-
20150521R01
The M2M System shall support modelling semantic descriptions
of Things (including relationships among them) by using
ontologies.
Implemented in
Rel-2
ONT-004 See REQ-
20150521R01
The M2M System should be able to provide translation
capabilities from different modeling languages for ontologies to
the language adopted by oneM2M if the expressiveness of the
imported ontology allows.
Not
implemented
ONT-005 See REQ-
20150521R01
The M2M System shall provide the capability to retrieve semantic
descriptions and ontologies stored outside of the M2M System.
Not
implemented
ONT-007 See REQ-
20150521R01
The M2M System shall be able to support extending ontologies in
the M2M System.
Not
implemented
ONT-008 See REQ-
20150521R01
The M2M System shall be able to use ontologies that contain
concepts representing aspects (e.g. a room) that are not
represented by resources of the M2M System.
Implemented in
Rel-2
17 requirements
Semantics Requirements (1)
10
Ontology Related Requirements
Table 3: Ontology Requirements
Requirement ID Description Release
ONT-013 See
REQ-20150521R01
The M2M System shall be able to support update of ontologies. Not
implemented
ONT-014 See
REQ-20150521R01
The M2M System shall enable functions for data conversion
based on ontologies.
Not
implemented
ONT-015 See
REQ-20150521R01
The M2M System shall be able to model devices based on
ontologies which may be available outside the M2M System (e.g.
HGI device template).
Implemented in
Rel-2
ONT-016 See
REQ-20150521R01
The M2M System shall support storage, management and
discovery of ontologies.
Not
implemented
ONT-017 See
REQ-20150609
The oneM2M System shall support a semantic relation ("Is
Paired To") between two M2M Devices.
Not
implemented
HGI device template
• HGI has completed its mission to set key specifications for Home Gateways, Home Networks, and the
Smart Home. HGI worked from 2005 until 2016.
11
Fig.2. Home Gateway project template
http://www.homegatewayinitiative.org/
Semantics Annotation Requirements
12
Table 4: Semantics Annotation Requirements
7 requirements
Requirement ID Description Release
ANN-001 See REQ-
20150521R01
The oneM2M System shall provide capabilities to manage
manage semantic information about the oneM2M resources,
Implemented in Rel-2
2
ANN-002 See REQ-
20150521R01
The oneM2M System shall support a common language for
language for semantic description, e.g. RDF.
Implemented in Rel-2
ANN-004 See REQ-
20150521R01
The oneM2M System shall support semantic annotation
annotation based on related ontologies.
Implemented in Rel-2
ANN-006 See REQ-
20150521R01
The oneM2M System shall enable applications to retrieve an
retrieve an ontology representation related to semantic
semantic information used in the M2M System.
Not implemented
ANN-007 See REQ-
20150521R01
The oneM2M system shall provide capabilities to manage
manage data quality descriptions of resource.
Not implemented
Semantics Query Requirements
13
Table 5: Semantics Query Requirements
1 requirement
Requirement ID Description Release
QRY-001 See REQ-
20150521R01
The oneM2M System shall provide capabilities to discover
discover M2M Resources based on semantic descriptions.
descriptions.
Implemented in Rel-2
2
Semantics Mashup Requirements
14
Table 6: Semantics Annotation Requirements
5 requirements
Requirement ID Description Release
MSH-001 See REQ-
REQ-20150521R01
The oneM2M System shall provide the capability to host
host processing functions for mash-up.
Not implemented
MSH-002 See REQ-
REQ-20150521R01
The oneM2M System shall enable M2M Applications to
Applications to provide processing functions for mash-
mash-up.
Not implemented
MSH-003 See REQ-
REQ-20150521R01
The oneM2M System itself may provide pre-provisioned
provisioned or dynamically created processing functions
functions for mash-up.
Not implemented
MSH-004 See REQ-
REQ-20150521R01
The oneM2M System shall be able to create and execute
execute mash-ups based on processing functions.
Not implemented
MSH-005 See REQ-
REQ-20150521R01
The oneM2M System shall be able to expose mash-ups
ups as resources e.g. virtual devices.
Not implemented
Semantics Reasoning Requirements
15
Table 7: Semantics Reasoning Requirements
3 requirements
Requirement ID Description Release
RES-001 See REQ-
20150521R01
The oneM2M System shall be able to update ontologies as a
result of the ontology reasoning.
Not implemented
RES-002 See REQ-
20150521R01
The oneM2M System shall be able to support semantic
reasoning e.g. ontology reasoning or semantic rule-based
reasoning.
Not implemented
RES-003 See REQ-
20150521R01
The oneM2M System shall be able to support adding and
updating semantic information based on semantic reasoning.
Not implemented
Data Analytics Requirements
16
Table 8: Data Analytics Requirements
Requirement
ID
Description Release
ANA-001 See REQ-
20150521R01
The oneM2M System shall be able to support capabilities (e.g.
processing function) for performing M2M data analytics based on
semantic descriptions from M2M Applications and /or from the M2M
System.
Not implemented
ANA-002 See REQ-
20150521R01
The oneM2M System shall provide the capability of interpreting and
applying service logic (e.g. rules/policies of triggering operations upon
other resources or attributes according to the change of the monitored
resource) described with semantic annotation and ontology.
Not implemented
ANA-003 See REQ-
20150521R01
The oneM2M System shall support a standardized format for the
rules/policies used to define service logic.
Not implemented
3 requirements
Security Requirements
17
Table 9: Security Requirements63 requirements
Requirement
ID
Description Release
SER-001 The oneM2M System shall incorporate protection against threats to its
its availability such as Denial of Service attacks.
Partially Implemented in
in Rel-1
SER-002 The oneM2M System shall be able to ensure the Confidentiality of data.
data.
Implemented in Rel-1
SER-003 The oneM2M System shall be able to ensure the Integrity of data. Implemented in Rel-1
SER-008 The oneM2M System shall support countermeasures against
unauthorized access to M2M Services and M2M Application Services.
Services.
Implemented in Rel-1
SER-009 The oneM2M System shall be able to support Mutual Authentication for
for interaction with Underlying Networks, M2M Services and M2M
Application Services.
Implemented in Rel-1
SER-010 The oneM2M System shall be able to support mechanisms for protection
protection against misuse, cloning, substitution or theft of security
security credentials.
Implemented in Rel-1
SER-011 The oneM2M System shall protect the use of the identity of an M2M
M2M Stakeholder within the oneM2M System against discovery and
misuse by other stakeholders.
Implemented in Rel-1
SER-012 The oneM2M System shall be able to support countermeasures against
against Impersonation attacks and replay attacks.
Partially implemented in
in Rel-1 (see note 3)
SER-013 The oneM2M System shall be able to provide the mechanism for
integrity checking on boot, periodically on run-time, and on software
software upgrades for software/hardware/firmware component(s) on
Not implemented
Security Requirements (1)
18
Table 9: Security Requirements
Requirement ID Description Release
SER-014 The oneM2M System shall be able to provide configuration data
to an authenticated and authorized M2M Application in the M2M
Gateway/Device.
Implemented in Rel-1
SER-019 The oneM2M System shall be able to use service-level
Credentials present inside the M2M Device for establishing the
M2M Services and M2M Applications level security.
Implemented in Rel-1
SER-024 The oneM2M System shall enable M2M Applications to use
different and segregated security environments.
Partially implemented
SER-026 The oneM2M System shall be able to provide mechanism for the
protection of Confidentiality of the geographical location information
(see note 2).
Implemented in Rel-1
SER-030 The oneM2M System shall enable security protocol end-points to
protect portions of individual oneM2M messages so that
intermediate entities (whether trusted or untrusted) forwarding the
messages are unable to access the protected portions of the
messages in clear text.
Implemented in Rel-2
SER-033 See
REQ-
20150569R03
The oneM2M System shall enable security protocol end-points to
establish security sessions which are used for protecting
portions of one or more oneM2M messages so that security
protocol end-points can detect modification, including modification
by intermediate service layer entities (whether trusted or untrusted)
forwarding the messages.
Implemented in Rel-2
SER-036 See
REQ-
20150575R01
The oneM2M System shall enable security protocol end-points
to authenticate each other without relying on intermediate
service layer entities (whether trusted or untrusted).
Implemented in Rel-2
Security Requirements (2)
19
Table 9: Security Requirements
Requirement ID Description Release
SER-050 See
REQ-20150620
The oneM2M System shall enable pre-defined conditions to be
protected from unauthorized modification.
Implemented in Rel-2
SER-051 See
REQ-20150620
The oneM2M System shall enable the deletion of M2M data
produced/stored by the M2M Devices/Gateways based on request
from an authorized entity.
Implemented in Rel-2
SER-052 See
REQ-
20150621R01
The oneM2M System shall store and process privacy
preferences in an interoperable manner.
Implemented in Rel-2
SER-055 See
REQ-
20150623R01
The oneM2M System shall be able to support configuration of
security related settings of its infrastructure side components
by a privileged user through standardized API.
Not implemented
SER-056 See
REQ-
20150623R01
The oneM2M System shall allow overriding of security settings
by a privileged User through standardized API.
Not implemented
SER-061 See
0585R01- App-ID
Requirements
The oneM2M System shall be able to verify the App-ID to
support the detection of impersonation or to support revocation.
Not implemented
SER-062 See
REQ-
20160056R01
The oneM2M system shall be able to reuse the privacy policy of
the underlying network.
Not implemented
Charging Requirements
20
Table 10: Charging Requirements
Requirement ID Description Release
CHG-001 The oneM2M System shall support collection of charging specific
information related to the individual services facilitated by the
oneM2M System (e.g. Data Management, Device Management
and/or Connectivity Management). Collection of charging specific
information shall be possible concurrent with the resource
usage. The format of the recorded information shall be fully
specified including mandatory and optional elements.
Implemented in Rel-1
(see note 4)
CHG-002 The oneM2M System shall support mechanisms to facilitate
correlation of charging information (e.g. of a User) collected for
M2M Services, M2M Application Services and services
provided by Underlying Network Operators.
Partially implemented
(see note 2)
CHG-003 The oneM2M System shall provide means to coordinate charging
data records for data usages with differentiated QoS from the
Underlying Network.
Not implemented
CHG-006 The oneM2M System should support generation of charging
events for the purpose of requesting resource usage
Authorization from the real time credit control system where the
subscriber account is located. The information contained in the
charging events and the relevant chargeable events shall be fully
specified including mandatory and optional elements (see note 1).
Not implemented
6 requirements
Operational Requirements
21
Table 11: Charging Requirements
Requirement ID Description Release
OPR-001 The oneM2M System shall provide the capability for monitoring
and diagnostics of M2M Applications.
Implemented in Rel-1
OPR-002 The oneM2M System shall provide the capability for software
management of M2M Applications.
Implemented in Rel-1
OPR-003 The oneM2M System shall be able to configure the execution
state an M2M Application (start, stop, restart).
Implemented in Rel-1
OPR-006 Depending on availability of suitable interfaces provided by the
Underlying Network the oneM2M System shall be able to
provide information related to usage and traffic characteristics
of M2M Devices or M2M Gateways to the Underlying Network.
Implemented in Rel-2
OPR-008 See
REQ-
20150550R03
The oneM2M System shall be able to provide the M2M
Applications with status information received from the Underlying
Network.
Not implemented
OPR-010 See
0585R01- App-ID
Requirements
The oneM2M System Registration Authorities shall be able to
collect and maintain supporting required information when
assigning an App-ID.
Implemented in Rel-2
NOTE: "Time controlled" is equivalent to the MTC Features specified in clause 7.2 of 3GPP TS 22.368 [1].
Communication Management Requirements
22
Table 12: Communication Management Requirements
Requirement
ID
Description Release
CMR-001 The oneM2M System shall provide to M2M Applications a communication
service which provides buffering of messages to/from M2M
Gateway/Device/ Infrastructure Domain.
Implemented in
Rel-1
CMR-002 The oneM2M System shall be able to support forwarding buffered messages
depending on communication policies and based on service preference
associated with the buffered messages.
Implemented in
Rel-1
CMR-005 The oneM2M System shall be able to maintain context associated with
M2M sessions (e.g. security context or network connectivity context during
the interruption of the session).
Partially
implemented (see
note 1)
CMR-006
See REQ-
20150564R0
2
The oneM2M System shall support the ability for applications to categorize
requested communications (priority, importance, etc.), so that the oneM2M
System can adapt its actual communications (scheduling, aggregation,
compression, etc.) by taking this categorization into account.
Implemented in
Rel-1
CMR-009
See REQ-
20150564R0
2
The oneM2M System should support data compression based on
communication policies when exchanging data between the M2M
Gateway/Device/Infrastructure Domain.
Not Implemented
15 requirements
Communication Management Requirements(1)
23
Table 12: Communication Management Requirements
Requirement
ID
Description Release
CMR-010 See
REQ-
20150564R02
The oneM2M System shall support an additional randomized delay of
communications, based on communication policies, when exchanging data
between the M2M Gateway/Device/Infrastructure Domain.
Implemented in
Rel-2
CMR-015 See
REQ-
20150601R01
The oneM2M System shall be able to identify a series of data (e.g. Time
Series Data) and indicate individual data belonging to this series.
Implemented in
Rel-2
NOTE 1: Long lived security context and registration is covered, M2M Sessions are not
covered.
NOTE 2: CMDH policies (application side) is implemented, information from the Underlying
Network can be utilized but the method for provisioning via Mcn is not covered.
LWM2M Interworking Requirements
24
Table 13: LWM2M Interworking Requirements
Requirement
ID
Description Release
LWM2M-001
See REQ-
20150517R04
The oneM2M System shall provide the capability to transparently transport
LWM2M Objects between LWM2M Clients and M2M Applications.
Implemented in Rel-
2
LWM2M-002
See REQ-
20150517R04
The oneM2M System shall provide the capability to translate LWM2M Objects
into a semantic representation of the LWM2M Object as oneM2M resources.
Implemented in Rel-
2
LWM2M-003
See REQ-
20150517R04
The oneM2M System shall provide the capabilities of the LWM2M Server in order
to interwork between LWM2M Clients and M2M Applications.
Implemented in Rel-
2
LWM2M-005
See REQ-
20150517R04
When transparently transporting LWM2M Objects, the oneM2M System shall
provide the capability for M2M Applications to discover the defining of LWM2M
Objects transported by the oneM2M System.
Not implemented
LWM2M-007
See REQ-
20150517R04
The oneM2M System shall provide capability to onboard devices that
incorporate a LWM2M Client.
Implemented in Rel-
2
LWM2M-008
See REQ-
20150517R04
The oneM2M System shall provide the capability to interoperate the
underlying security mechanisms of the LWM2M Client with the security
capabilities provided by the oneM2M System.
Implemented in Rel-
2
8 requirements
Non-Functional Requirements (informative)
25
Table 14: Non-Functional Requirements
Requirement
ID
Description Release
NFR-001 Continua Health Alliance is incorporating a RESTful approach to its design.
To support CHA, oneM2M should consider RESTful styles and approaches
while designing the M2M architecture.
Implemented in Rel-
1
NFR-002 The oneM2M System should communicate using protocols that are efficient
in terms of amount of exchanged information over amount of exchanged
data measured in bytes.
Implemented in Rel-
1
2 requirements
 This clause is intended to gather high-level principles and guidelines that shall govern the design of the
oneM2M System.
 Such principles and guidelines are fundamental to the design of the oneM2M System.
 But as they cannot necessarily be expressed as requirements per se, they shall be introduced and
expressed in this clause.
Thank you!
hamdamboy.urunov@gmail.com
26

More Related Content

What's hot

oneM2M - how standardization enables the next internet evolution
oneM2M -  how standardization enables the next internet evolutiononeM2M -  how standardization enables the next internet evolution
oneM2M - how standardization enables the next internet evolution
oneM2M
 
OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform Interoperability
AALForum
 
oneM2M overview
oneM2M overviewoneM2M overview
oneM2M overview
Young Sung Son
 
Eclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platformEclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platform
Mahdi Ben Alaya
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
Open Mobile Alliance
 
Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
Sajan Sahu
 
Smart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint managementSmart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint management
Soumya Kanti Datta
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
kimw001
 
Routing concept
Routing conceptRouting concept
Routing concept
Kim Chung
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
IJNSA Journal
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware BasicsVarun Arora
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
Djadja Sardjana
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
idrissaeed
 
3b716 nms 1
3b716 nms 13b716 nms 1
3b716 nms 1
Vandana Jagdish
 
3rd KuVS meeting
3rd KuVS meeting3rd KuVS meeting
3rd KuVS meetingsteccami
 
LTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced SecurityLTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced Security
Bryan Len
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET Journal
 

What's hot (20)

oneM2M - how standardization enables the next internet evolution
oneM2M -  how standardization enables the next internet evolutiononeM2M -  how standardization enables the next internet evolution
oneM2M - how standardization enables the next internet evolution
 
OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform Interoperability
 
oneM2M overview
oneM2M overviewoneM2M overview
oneM2M overview
 
Eclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platformEclipse OM2M: Standardized M2M service platform
Eclipse OM2M: Standardized M2M service platform
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
 
Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Smart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint managementSmart M2M gateway based architecture for m2m device and endpoint management
Smart M2M gateway based architecture for m2m device and endpoint management
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
 
Routing concept
Routing conceptRouting concept
Routing concept
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
Strix nms
Strix nmsStrix nms
Strix nms
 
3b716 nms 1
3b716 nms 13b716 nms 1
3b716 nms 1
 
3rd KuVS meeting
3rd KuVS meeting3rd KuVS meeting
3rd KuVS meeting
 
LTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced SecurityLTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced Security
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile Computing
 

Viewers also liked

Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
oneM2M
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and Semantics
oneM2M
 
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…Motive, Alcatel-Lucent
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
oneM2M
 
oneM2M Personal Connected Healthcare
oneM2M Personal Connected HealthcareoneM2M Personal Connected Healthcare
oneM2M Personal Connected Healthcare
oneM2M
 
Eclipse Paho - MQTT and the Internet of Things
Eclipse Paho - MQTT and the Internet of ThingsEclipse Paho - MQTT and the Internet of Things
Eclipse Paho - MQTT and the Internet of Things
Andy Piper
 
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra WirelessIoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
Open Mobile Alliance
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
Marc Jadoul
 

Viewers also liked (8)

Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and Semantics
 
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…
Alcatel-Lucent Motive Team: Motivation 2013: ONEM2M: Bringing Global Stand…
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
oneM2M Personal Connected Healthcare
oneM2M Personal Connected HealthcareoneM2M Personal Connected Healthcare
oneM2M Personal Connected Healthcare
 
Eclipse Paho - MQTT and the Internet of Things
Eclipse Paho - MQTT and the Internet of ThingsEclipse Paho - MQTT and the Internet of Things
Eclipse Paho - MQTT and the Internet of Things
 
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra WirelessIoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
IoT Seminar (Oct. 2016) Nicolas Damour - Sierra Wireless
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 

Similar to One m2m 2. requirements

FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
FIWARE
 
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Ike Alisson
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
venui2
 
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOLSDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
cscpconf
 
SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol
csandit
 
Flexible assembly system for hybrid micro systems
Flexible assembly system for hybrid micro systemsFlexible assembly system for hybrid micro systems
Flexible assembly system for hybrid micro systemsAndre Kuhn
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
 
M2M Day One
M2M Day OneM2M Day One
M2M Day One
Arief Gunawan
 
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PROIDEA
 
Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)Puran Pangeni
 
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
Ike Alisson
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoring
IJCNCJournal
 
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
Sara Parker
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Lightweight M2M
Lightweight M2MLightweight M2M
Lightweight M2M
Björn Ekelund
 
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
Fiona Phillips
 

Similar to One m2m 2. requirements (20)

FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
FIWARE Global Summit - OpenMTC - A Open Source Implementation of the oneM2M S...
 
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
FIWARE Global Summit - OpenMTC – An Open Source Implementation of the oneM2M ...
 
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
Akraino TSC ike 5G System and SP New Services Data centric Approach 2021 02 1...
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOLSDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
 
SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol
 
Flexible assembly system for hybrid micro systems
Flexible assembly system for hybrid micro systemsFlexible assembly system for hybrid micro systems
Flexible assembly system for hybrid micro systems
 
Zaleski_NEBC_Paper
Zaleski_NEBC_PaperZaleski_NEBC_Paper
Zaleski_NEBC_Paper
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
M2M Day One
M2M Day OneM2M Day One
M2M Day One
 
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
 
Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)
 
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
Ike A to LF Edge Akraino Comp Stor Netw & Commun & ETSI MEC AppD Mngmnt Prese...
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoring
 
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
 
Network management
Network managementNetwork management
Network management
 
Lightweight M2M
Lightweight M2MLightweight M2M
Lightweight M2M
 
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
 

More from Hamdamboy (함담보이)

OMA Lightweight M2M
OMA Lightweight M2M OMA Lightweight M2M
OMA Lightweight M2M
Hamdamboy (함담보이)
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
Hamdamboy (함담보이)
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
Hamdamboy (함담보이)
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
Hamdamboy (함담보이)
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
Hamdamboy (함담보이)
 
oma dm-protocol
oma dm-protocoloma dm-protocol
oma dm-protocol
Hamdamboy (함담보이)
 
oma dm-requirment
oma dm-requirmentoma dm-requirment
oma dm-requirment
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
Hamdamboy (함담보이)
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
Internet of things
Internet of thingsInternet of things
Internet of things
Hamdamboy (함담보이)
 

More from Hamdamboy (함담보이) (19)

OMA Lightweight M2M
OMA Lightweight M2M OMA Lightweight M2M
OMA Lightweight M2M
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
 
The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
oma dm-protocol
oma dm-protocoloma dm-protocol
oma dm-protocol
 
oma dm-requirment
oma dm-requirmentoma dm-requirment
oma dm-requirment
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

One m2m 2. requirements

  • 1. OneM2M Standard Specification Khamdamboy Urunov, a Ph.D. student. Special Communication Research Center., Financial Information Security., Kookmin University Seoul, South Korea Requirements (TS-0002-V2.7.1)
  • 2. The schedule of OneM2M Specification • TS-0002-V2.7.1 Requirements • TS-0001- Functional_Architecture-V2_10_0 • TS-0004_Service_Layer_Core_Protocol_V2_7_1 2
  • 3. Contents • Functional Requirements • Semantics Requirements • Security Requirements • Charging Requirements • Operational Requirements • Communication Management Requirements • LWM2M Interworking Requirements 3 Requirements (TS-0002-V2.7.1)
  • 4. Functional roles description 4 Individual or Company- end user - Provides an M2M Application Service - Operates M2M Application - Provides an M2M Services to Application Service Provider - Operates M2M Common Service • Provides Connectivity and related services for M2M Service Providers • Operates an Underlying Network. Such an Underlying Network could be a telecom network.
  • 5. 5 Requirement ID Description Release OSR-001 The oneM2M System shall allow communication between M2M Applications by using multiple communication means based on IP access. Implemented in Rel- 1 OSR-002a The oneM2M System shall support communication means that can accommodate devices with constrained computing (e.g. small CPU, memory, battery) or communication capabilities (e.g. 2G wireless modem, certain WLAN node). Implemented in Rel- 1 OSR-002b The oneM2M System shall support communication means that can accommodate devices with rich computing capabilities (e.g. large CPU, memory) or communication (e.g. 3/4G wireless modem, wireline). Implemented in Rel- 1 OSR-006 The oneM2M System shall be able to reuse the services offered by Underlying Networks to M2M Applications and/or M2M Services by means of open access models (e.g. OMA, GSMA OneAPI framework). Examples of available services are: • IP Multimedia communications. • Messaging. • Location. • Charging and billing services. • Device information and profiles. • Configuration and management of devices. • Triggering, monitoring of devices. • Small data transmission. • Group management. (see note 1). Partially implemented (see note 10 Table 1: Overall System Requirements Functional Requirements~100 requirements Note1: The set of features or APIs to be supported depends on the M2M Common Services and access to available APIs
  • 6. 6 Requirement ID Description Release OSR-012 The oneM2M System shall support communications between M2M Applications and M2M Devices supporting M2M Services by means of continuous or non continuous connectivity. Implemented in Rel-1 OSR-014 The oneM2M System shall be able to communicate with M2M Devices, behind an M2M Gateway that supports heterogeneous M2M Area Networks. Implemented in Rel-1 OSR-020 The oneM2M System shall be able to support policies and their management regarding the aspects of storage and retrieval of data/information. Implemented in Rel-1 OSR-021 The oneM2M System shall be able to provide mechanisms to enable sharing of data among multiple M2M Applications. Implemented in Rel-1 OSR-046 The oneM2M System shall be able to support a capability for the M2M Application to request/disallow acknowledgement for its communication. Not implemented Table 1: Overall System Requirement Functional Requirements (1)
  • 7. 7 Requirement ID Description Release OSR-061 M2M Devices and M2M Gateways may support time synchronization within the oneM2M System. Not implemented OSR-75 See REQ- 20150546R01 The oneM2M System shall be able to collect, store Time Series Data. Implemented in Rel-2 OSR-76 See REQ- 20150546R01 The oneM2M System shall be able to detect and report the missing data in time series. Implemented in Rel-2 OSR-086 See REQ- 20150611R02 The oneM2M System shall enable M2M Gateways to discover M2M Infrastructure Nodes and M2M Devices available for data exchange. Not implemented OSR-090 See REQ- 20150622R02 The oneM2M System shall be able to forward the M2M Application Data to M2M Application without storing the Data. Partially implemented (see note 22) OSR-098 See REQ- 20160055R02 The oneM2M system shall be able to support machine socialization functionalities (such as existence discovery, correlated task discovery, message interface discovery and process optimization for multiple machines with same tasks). Not implemented Table 1: Overall System Requirem Functional Requirements (2) NOTE 22: In Rel-2 data are stored in the CSE but never get retrieved by other entities except by subscribe/notify mechanism.
  • 8. Management Requirements 8 Table 2: Management Requirements ~19 requirements Requirement ID Description Release MGR-001 The oneM2M System shall be able to support management and configuration of M2M Gateways/ Devices including resource constrained M2M Devices. Implemented in Rel-1 MGR-002 The oneM2M System shall provide the capability to discover the M2M Area Networks including information about devices on those networks and the parameters (e.g. topology, protocol) of those networks. Implemented in Rel-1 MGR-008 The oneM2M System shall provide the capability for software management of devices in M2M Area Networks. Implemented in Rel-1 MGR-009 The oneM2M System shall provide the capability for rebooting and/or resetting of M2M Gateways/Devices and other devices in M2M Area Networks. Implemented in Rel-1 MGR-010 The oneM2M System shall provide the capability for authorizing devices to access M2M Area Networks. Implemented in Rel-1 MGR-016 The oneM2M System shall be able to retrieve information related to the Static and Dynamic Device/Gateway Context for M2M Gateways/Devices as well as Device Context for other devices in M2M Area Networks. Implemented in Rel-1
  • 9. Semantics Requirements 9 Ontology Related Requirements Table 3: Ontology Requirements Requirement ID Description Release ONT-001 See REQ- 20150521R01 The M2M System shall support a standardized format for the rules/policies used to define service logic. Not implemented ONT-002 See REQ- 20150521R01 The M2M System shall support modelling semantic descriptions of Things (including relationships among them) by using ontologies. Implemented in Rel-2 ONT-004 See REQ- 20150521R01 The M2M System should be able to provide translation capabilities from different modeling languages for ontologies to the language adopted by oneM2M if the expressiveness of the imported ontology allows. Not implemented ONT-005 See REQ- 20150521R01 The M2M System shall provide the capability to retrieve semantic descriptions and ontologies stored outside of the M2M System. Not implemented ONT-007 See REQ- 20150521R01 The M2M System shall be able to support extending ontologies in the M2M System. Not implemented ONT-008 See REQ- 20150521R01 The M2M System shall be able to use ontologies that contain concepts representing aspects (e.g. a room) that are not represented by resources of the M2M System. Implemented in Rel-2 17 requirements
  • 10. Semantics Requirements (1) 10 Ontology Related Requirements Table 3: Ontology Requirements Requirement ID Description Release ONT-013 See REQ-20150521R01 The M2M System shall be able to support update of ontologies. Not implemented ONT-014 See REQ-20150521R01 The M2M System shall enable functions for data conversion based on ontologies. Not implemented ONT-015 See REQ-20150521R01 The M2M System shall be able to model devices based on ontologies which may be available outside the M2M System (e.g. HGI device template). Implemented in Rel-2 ONT-016 See REQ-20150521R01 The M2M System shall support storage, management and discovery of ontologies. Not implemented ONT-017 See REQ-20150609 The oneM2M System shall support a semantic relation ("Is Paired To") between two M2M Devices. Not implemented
  • 11. HGI device template • HGI has completed its mission to set key specifications for Home Gateways, Home Networks, and the Smart Home. HGI worked from 2005 until 2016. 11 Fig.2. Home Gateway project template http://www.homegatewayinitiative.org/
  • 12. Semantics Annotation Requirements 12 Table 4: Semantics Annotation Requirements 7 requirements Requirement ID Description Release ANN-001 See REQ- 20150521R01 The oneM2M System shall provide capabilities to manage manage semantic information about the oneM2M resources, Implemented in Rel-2 2 ANN-002 See REQ- 20150521R01 The oneM2M System shall support a common language for language for semantic description, e.g. RDF. Implemented in Rel-2 ANN-004 See REQ- 20150521R01 The oneM2M System shall support semantic annotation annotation based on related ontologies. Implemented in Rel-2 ANN-006 See REQ- 20150521R01 The oneM2M System shall enable applications to retrieve an retrieve an ontology representation related to semantic semantic information used in the M2M System. Not implemented ANN-007 See REQ- 20150521R01 The oneM2M system shall provide capabilities to manage manage data quality descriptions of resource. Not implemented
  • 13. Semantics Query Requirements 13 Table 5: Semantics Query Requirements 1 requirement Requirement ID Description Release QRY-001 See REQ- 20150521R01 The oneM2M System shall provide capabilities to discover discover M2M Resources based on semantic descriptions. descriptions. Implemented in Rel-2 2
  • 14. Semantics Mashup Requirements 14 Table 6: Semantics Annotation Requirements 5 requirements Requirement ID Description Release MSH-001 See REQ- REQ-20150521R01 The oneM2M System shall provide the capability to host host processing functions for mash-up. Not implemented MSH-002 See REQ- REQ-20150521R01 The oneM2M System shall enable M2M Applications to Applications to provide processing functions for mash- mash-up. Not implemented MSH-003 See REQ- REQ-20150521R01 The oneM2M System itself may provide pre-provisioned provisioned or dynamically created processing functions functions for mash-up. Not implemented MSH-004 See REQ- REQ-20150521R01 The oneM2M System shall be able to create and execute execute mash-ups based on processing functions. Not implemented MSH-005 See REQ- REQ-20150521R01 The oneM2M System shall be able to expose mash-ups ups as resources e.g. virtual devices. Not implemented
  • 15. Semantics Reasoning Requirements 15 Table 7: Semantics Reasoning Requirements 3 requirements Requirement ID Description Release RES-001 See REQ- 20150521R01 The oneM2M System shall be able to update ontologies as a result of the ontology reasoning. Not implemented RES-002 See REQ- 20150521R01 The oneM2M System shall be able to support semantic reasoning e.g. ontology reasoning or semantic rule-based reasoning. Not implemented RES-003 See REQ- 20150521R01 The oneM2M System shall be able to support adding and updating semantic information based on semantic reasoning. Not implemented
  • 16. Data Analytics Requirements 16 Table 8: Data Analytics Requirements Requirement ID Description Release ANA-001 See REQ- 20150521R01 The oneM2M System shall be able to support capabilities (e.g. processing function) for performing M2M data analytics based on semantic descriptions from M2M Applications and /or from the M2M System. Not implemented ANA-002 See REQ- 20150521R01 The oneM2M System shall provide the capability of interpreting and applying service logic (e.g. rules/policies of triggering operations upon other resources or attributes according to the change of the monitored resource) described with semantic annotation and ontology. Not implemented ANA-003 See REQ- 20150521R01 The oneM2M System shall support a standardized format for the rules/policies used to define service logic. Not implemented 3 requirements
  • 17. Security Requirements 17 Table 9: Security Requirements63 requirements Requirement ID Description Release SER-001 The oneM2M System shall incorporate protection against threats to its its availability such as Denial of Service attacks. Partially Implemented in in Rel-1 SER-002 The oneM2M System shall be able to ensure the Confidentiality of data. data. Implemented in Rel-1 SER-003 The oneM2M System shall be able to ensure the Integrity of data. Implemented in Rel-1 SER-008 The oneM2M System shall support countermeasures against unauthorized access to M2M Services and M2M Application Services. Services. Implemented in Rel-1 SER-009 The oneM2M System shall be able to support Mutual Authentication for for interaction with Underlying Networks, M2M Services and M2M Application Services. Implemented in Rel-1 SER-010 The oneM2M System shall be able to support mechanisms for protection protection against misuse, cloning, substitution or theft of security security credentials. Implemented in Rel-1 SER-011 The oneM2M System shall protect the use of the identity of an M2M M2M Stakeholder within the oneM2M System against discovery and misuse by other stakeholders. Implemented in Rel-1 SER-012 The oneM2M System shall be able to support countermeasures against against Impersonation attacks and replay attacks. Partially implemented in in Rel-1 (see note 3) SER-013 The oneM2M System shall be able to provide the mechanism for integrity checking on boot, periodically on run-time, and on software software upgrades for software/hardware/firmware component(s) on Not implemented
  • 18. Security Requirements (1) 18 Table 9: Security Requirements Requirement ID Description Release SER-014 The oneM2M System shall be able to provide configuration data to an authenticated and authorized M2M Application in the M2M Gateway/Device. Implemented in Rel-1 SER-019 The oneM2M System shall be able to use service-level Credentials present inside the M2M Device for establishing the M2M Services and M2M Applications level security. Implemented in Rel-1 SER-024 The oneM2M System shall enable M2M Applications to use different and segregated security environments. Partially implemented SER-026 The oneM2M System shall be able to provide mechanism for the protection of Confidentiality of the geographical location information (see note 2). Implemented in Rel-1 SER-030 The oneM2M System shall enable security protocol end-points to protect portions of individual oneM2M messages so that intermediate entities (whether trusted or untrusted) forwarding the messages are unable to access the protected portions of the messages in clear text. Implemented in Rel-2 SER-033 See REQ- 20150569R03 The oneM2M System shall enable security protocol end-points to establish security sessions which are used for protecting portions of one or more oneM2M messages so that security protocol end-points can detect modification, including modification by intermediate service layer entities (whether trusted or untrusted) forwarding the messages. Implemented in Rel-2 SER-036 See REQ- 20150575R01 The oneM2M System shall enable security protocol end-points to authenticate each other without relying on intermediate service layer entities (whether trusted or untrusted). Implemented in Rel-2
  • 19. Security Requirements (2) 19 Table 9: Security Requirements Requirement ID Description Release SER-050 See REQ-20150620 The oneM2M System shall enable pre-defined conditions to be protected from unauthorized modification. Implemented in Rel-2 SER-051 See REQ-20150620 The oneM2M System shall enable the deletion of M2M data produced/stored by the M2M Devices/Gateways based on request from an authorized entity. Implemented in Rel-2 SER-052 See REQ- 20150621R01 The oneM2M System shall store and process privacy preferences in an interoperable manner. Implemented in Rel-2 SER-055 See REQ- 20150623R01 The oneM2M System shall be able to support configuration of security related settings of its infrastructure side components by a privileged user through standardized API. Not implemented SER-056 See REQ- 20150623R01 The oneM2M System shall allow overriding of security settings by a privileged User through standardized API. Not implemented SER-061 See 0585R01- App-ID Requirements The oneM2M System shall be able to verify the App-ID to support the detection of impersonation or to support revocation. Not implemented SER-062 See REQ- 20160056R01 The oneM2M system shall be able to reuse the privacy policy of the underlying network. Not implemented
  • 20. Charging Requirements 20 Table 10: Charging Requirements Requirement ID Description Release CHG-001 The oneM2M System shall support collection of charging specific information related to the individual services facilitated by the oneM2M System (e.g. Data Management, Device Management and/or Connectivity Management). Collection of charging specific information shall be possible concurrent with the resource usage. The format of the recorded information shall be fully specified including mandatory and optional elements. Implemented in Rel-1 (see note 4) CHG-002 The oneM2M System shall support mechanisms to facilitate correlation of charging information (e.g. of a User) collected for M2M Services, M2M Application Services and services provided by Underlying Network Operators. Partially implemented (see note 2) CHG-003 The oneM2M System shall provide means to coordinate charging data records for data usages with differentiated QoS from the Underlying Network. Not implemented CHG-006 The oneM2M System should support generation of charging events for the purpose of requesting resource usage Authorization from the real time credit control system where the subscriber account is located. The information contained in the charging events and the relevant chargeable events shall be fully specified including mandatory and optional elements (see note 1). Not implemented 6 requirements
  • 21. Operational Requirements 21 Table 11: Charging Requirements Requirement ID Description Release OPR-001 The oneM2M System shall provide the capability for monitoring and diagnostics of M2M Applications. Implemented in Rel-1 OPR-002 The oneM2M System shall provide the capability for software management of M2M Applications. Implemented in Rel-1 OPR-003 The oneM2M System shall be able to configure the execution state an M2M Application (start, stop, restart). Implemented in Rel-1 OPR-006 Depending on availability of suitable interfaces provided by the Underlying Network the oneM2M System shall be able to provide information related to usage and traffic characteristics of M2M Devices or M2M Gateways to the Underlying Network. Implemented in Rel-2 OPR-008 See REQ- 20150550R03 The oneM2M System shall be able to provide the M2M Applications with status information received from the Underlying Network. Not implemented OPR-010 See 0585R01- App-ID Requirements The oneM2M System Registration Authorities shall be able to collect and maintain supporting required information when assigning an App-ID. Implemented in Rel-2 NOTE: "Time controlled" is equivalent to the MTC Features specified in clause 7.2 of 3GPP TS 22.368 [1].
  • 22. Communication Management Requirements 22 Table 12: Communication Management Requirements Requirement ID Description Release CMR-001 The oneM2M System shall provide to M2M Applications a communication service which provides buffering of messages to/from M2M Gateway/Device/ Infrastructure Domain. Implemented in Rel-1 CMR-002 The oneM2M System shall be able to support forwarding buffered messages depending on communication policies and based on service preference associated with the buffered messages. Implemented in Rel-1 CMR-005 The oneM2M System shall be able to maintain context associated with M2M sessions (e.g. security context or network connectivity context during the interruption of the session). Partially implemented (see note 1) CMR-006 See REQ- 20150564R0 2 The oneM2M System shall support the ability for applications to categorize requested communications (priority, importance, etc.), so that the oneM2M System can adapt its actual communications (scheduling, aggregation, compression, etc.) by taking this categorization into account. Implemented in Rel-1 CMR-009 See REQ- 20150564R0 2 The oneM2M System should support data compression based on communication policies when exchanging data between the M2M Gateway/Device/Infrastructure Domain. Not Implemented 15 requirements
  • 23. Communication Management Requirements(1) 23 Table 12: Communication Management Requirements Requirement ID Description Release CMR-010 See REQ- 20150564R02 The oneM2M System shall support an additional randomized delay of communications, based on communication policies, when exchanging data between the M2M Gateway/Device/Infrastructure Domain. Implemented in Rel-2 CMR-015 See REQ- 20150601R01 The oneM2M System shall be able to identify a series of data (e.g. Time Series Data) and indicate individual data belonging to this series. Implemented in Rel-2 NOTE 1: Long lived security context and registration is covered, M2M Sessions are not covered. NOTE 2: CMDH policies (application side) is implemented, information from the Underlying Network can be utilized but the method for provisioning via Mcn is not covered.
  • 24. LWM2M Interworking Requirements 24 Table 13: LWM2M Interworking Requirements Requirement ID Description Release LWM2M-001 See REQ- 20150517R04 The oneM2M System shall provide the capability to transparently transport LWM2M Objects between LWM2M Clients and M2M Applications. Implemented in Rel- 2 LWM2M-002 See REQ- 20150517R04 The oneM2M System shall provide the capability to translate LWM2M Objects into a semantic representation of the LWM2M Object as oneM2M resources. Implemented in Rel- 2 LWM2M-003 See REQ- 20150517R04 The oneM2M System shall provide the capabilities of the LWM2M Server in order to interwork between LWM2M Clients and M2M Applications. Implemented in Rel- 2 LWM2M-005 See REQ- 20150517R04 When transparently transporting LWM2M Objects, the oneM2M System shall provide the capability for M2M Applications to discover the defining of LWM2M Objects transported by the oneM2M System. Not implemented LWM2M-007 See REQ- 20150517R04 The oneM2M System shall provide capability to onboard devices that incorporate a LWM2M Client. Implemented in Rel- 2 LWM2M-008 See REQ- 20150517R04 The oneM2M System shall provide the capability to interoperate the underlying security mechanisms of the LWM2M Client with the security capabilities provided by the oneM2M System. Implemented in Rel- 2 8 requirements
  • 25. Non-Functional Requirements (informative) 25 Table 14: Non-Functional Requirements Requirement ID Description Release NFR-001 Continua Health Alliance is incorporating a RESTful approach to its design. To support CHA, oneM2M should consider RESTful styles and approaches while designing the M2M architecture. Implemented in Rel- 1 NFR-002 The oneM2M System should communicate using protocols that are efficient in terms of amount of exchanged information over amount of exchanged data measured in bytes. Implemented in Rel- 1 2 requirements  This clause is intended to gather high-level principles and guidelines that shall govern the design of the oneM2M System.  Such principles and guidelines are fundamental to the design of the oneM2M System.  But as they cannot necessarily be expressed as requirements per se, they shall be introduced and expressed in this clause.